Cargando…

Noiseless Steganography: The Key to Covert Communications

Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of st...

Descripción completa

Detalles Bibliográficos
Autor principal: Desoky, Abdelrahman
Lenguaje:eng
Publicado: CRC Press 2012
Materias:
Acceso en línea:http://cds.cern.ch/record/1438677
_version_ 1780924636435841024
author Desoky, Abdelrahman
author_facet Desoky, Abdelrahman
author_sort Desoky, Abdelrahman
collection CERN
description Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b
id cern-1438677
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2012
publisher CRC Press
record_format invenio
spelling cern-14386772020-07-16T20:02:19Zhttp://cds.cern.ch/record/1438677engDesoky, AbdelrahmanNoiseless Steganography: The Key to Covert CommunicationsComputing and ComputersAmong the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise bCRC Pressoai:cds.cern.ch:14386772012
spellingShingle Computing and Computers
Desoky, Abdelrahman
Noiseless Steganography: The Key to Covert Communications
title Noiseless Steganography: The Key to Covert Communications
title_full Noiseless Steganography: The Key to Covert Communications
title_fullStr Noiseless Steganography: The Key to Covert Communications
title_full_unstemmed Noiseless Steganography: The Key to Covert Communications
title_short Noiseless Steganography: The Key to Covert Communications
title_sort noiseless steganography: the key to covert communications
topic Computing and Computers
url http://cds.cern.ch/record/1438677
work_keys_str_mv AT desokyabdelrahman noiselesssteganographythekeytocovertcommunications